Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Issue is more complicated (Score 1) 920

Fun fact, I communicated with aforementioned biologists via email (and later Facebook) before we met IRL [1]. There never has been any need for calling each other rude names. On the contrary, most of them are so extremely polite that now and then I feel uncomfortable. I can't even call myself an amateur arachnologist yet they have always treated me with respect, and replied to my questions without all the "U n00b" and "U 1user" attitude I constantly see in IT.

I am a member of several Facebook groups (on arachnids, on orchids, etc.) and most of the time the discussions are friendly and polite. The total amount of abrasive attitude one can find in the comments to a single Slashdot posts between people, even excluding ACs, I haven't seen in all those groups together for years. Oh, and there are plenty of females in those groups. Maybe that's no coincidence?

[1] Another fun fact, I met my wife online, also.

Comment Re:Issue is more complicated (Score 4, Interesting) 920

I don't, I prefer "I don't appreciate your behaviour". Years ago I left Usenet because I noticed that the abrasive attitude was very easy to pick up (I certainly have played my ugly part) and in most IT related groups. It's also the reason why I don't contribute to any open source project. No idea if it's IT specific because I have friends who are biologists and I don't see that attitude between them. Maybe I don't know them well enough, I only see them a few days now and then during field trips. But each time it's like a fresh breath of air compared to the IT attitude.

Comment Re:"with a 2048 bit RSA key" (Score 4, Insightful) 79

No. A password should be used as the parameter for a one-way function ("hash function") and the result should be stored. If the user logs in, the password given should be used as a parameter for the same one-way function. If the result is the same as the value stored, the password is the same. Good properties of such a hash function is that it's slow, that the probability of result values is uniformly distributed, and that similar input values don't result in similar output values.

Because pre-calculated tables exist it's good practice to add a "salt" to the password. Otherwise one just calculates the hash value of '1234567' and looks in the results for this hash value.

Mirrors should reflect a little before throwing back images. -- Jean Cocteau